A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
From MaRDI portal
Publication:2435610
DOI10.1007/s11071-013-0772-4zbMath1281.94084OpenAlexW1997702683WikidataQ114689445 ScholiaQ114689445MaRDI QIDQ2435610
Che-Wei Hsu, Chun-Ta Li, Cheng-Chi Lee
Publication date: 19 February 2014
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-013-0772-4
Related Items (18)
Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ A provable privacy-protection system for multi-server environment ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps ⋮ Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Unnamed Item
- Chaotic map based key agreement with/out clock synchronization
- A block cipher with dynamic S-boxes based on tent map
- A chaos-based hash function with both modification detection and localization capabilities
- A speech encryption using fractional chaotic systems
- One-way hash function construction based on the chaotic map with changeable-parameter
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- Simple authenticated key agreement and protected password change protocol
- Efficient verifier-based key agreement protocol for three parties without server's public key
- IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY
- Security of public-key cryptosystems based on Chebyshev polynomials
- Financial Cryptography and Data Security
This page was built for publication: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps